Target Digital Network Analyst

Timestamp: 2015-12-25

I have over 10 years of computer systems technology experience combined with 7 years of network intelligence analysis experience. While working as a network administrator, I obtained a Bachelor’s degree in Psychology with intentions of developing my analytical thinking and I discovered my interest in intelligence analysis in 2007. Having worked as an analyst in various intelligence settings such as DCGS(Arkansas), CSG (Ramstein, Germany) and MENA/ DNI(Georgia), I decided to obtain my Associate’s in both career fields, taking the extra class to earn my degrees in Information Technology and Intelligence Studies from the Community College of the Air Force. To expand on my knowledge, I took all the courses offered in Network Exploitation and Target Analytics (NETA) resulting in my certification as a target digital network analyst. With my combined education, training/certifications, and work experience, I can pride myself as being an asset to any company. I am highly self-motivated and enjoy working in team environments. Please see the remaining details of my resume’ below and I look forward to joining your dynamic team.

Comm-Computer Systems Operator

Start Date: 2004-04-01End Date: 2008-01-01

Provided information technology support to members of the 223rd Combat Communications Squadron, to include the installation, maintenance, and repair of desktop computer systems, LAN terminals, and other computer peripheral equipment • worked help desk to assist customers with email set up, networking issues, hardware/software issues, directly interfaced with external customers to ensure their issue was resolved, used working knowledge of Microsoft Office, Excel, & Outlook, UNIX, Linux, and Windows O/S to maintain network administrative duties

SIGINT Liaison Officer

Start Date: 2008-01-01End Date: 2012-10-01

Provided direct Title 50 Service Cryptologic Element support to units employed in contingency operations and system development. • Served as a liaison for the sharing and facilitation SIGINT between major military commands and national intelligence agencies for space control and cyber operations. • Performed signal analysis to document unique characteristics for the identification of parameters, processing, and utilization of countermeasures critical to development and deployment of 5 quick reaction systems in response to COCOM priorities. • Developed and refined techniques, tactics, and procedures in support of space control and cyber operations. • Accessed, researched, and analyzed special intelligence databases for the dissemination of validated reporting to determine threat environments, basing, and employment of space control and cyber assets in support of deliberate/crisis action planning. • Fused multi-discipline intelligence to create training products and scenarios for employment in bi-monthly readiness exercises and real world simulation training. • Prepared written and oral assessments of current events based on the sophisticated collection, research, and analysis of classified and open source information.

Signals Analyst

Start Date: 2005-11-01End Date: 2008-01-01

Utilized complex signals analysis hardware and software to process, manipulate and extract intelligence from electromagnetic emissions. • Performed bitstream analysis of unique communications signals to determine characteristics, signatures, data types, networks and users; distributed analytical findings detailing techniques and procedures for exploitation development. • Analyzed packet level digital network data for the identification of users in support of SIGDEV targeting and development. • Developed algorithms for the resolution of advanced communication signals supporting field stations, mobile collection platforms, and sensitive special operations missions. • Created and disseminated programming code for worldwide processing solutions to collect, demodulate, identify and extract digital network intelligence. • Authored communication classification standards for use by the SIGINT community to classify and report a wide variety of signals with their associated parameters and characteristics. • Managed National level tasking, collection and prosecution of field site activities utilizing National Collection and Geo-location systems. • Performed analysis and quality control of Passive Geo-locational data ensuring accuracy prior to dissemination to supported intelligence community customers.

Geospatial Analyst

Start Date: 2012-10-01

Performs Geospatial and DNR analysis of signal environments and networks for the employment of Active Precision Geo-location systems. • Fuses Geo-locational data with Full Motion Video to provide terminal guidance for operators performing counter-insurgency operations. • Accesses national intelligence databases for the analysis and characterization of DNI/DNR networks in support of high priority intelligence requirements. • Collaborates national and tactical collection, analysis, reporting, and operations for advanced target development efforts in support of counter-terrorism operations. • Produces geo-location data supporting the development and dissemination of intelligence reporting.

SYSTEM ADMINISTRATOR (JUNIOR)

Start Date: 2009-03-01End Date: 2009-06-01

•Performed daily system monitoring on a SYBASE system. •Verified the integrity and availability of all hardware, server resources, systems and key processes by reviewing system and application logs. •Performed daily backup operations, ensuring all required file systems and system data was successfully backed up to the appropriate media. •Created new user accounts, reset passwords and locked and unlocked user accounts. •Supported the mission on all system failures by bringing the system down and up in a timely fashion.

SENIOR SYSTEMS ENGINEER

Start Date: 2003-12-01End Date: 2007-01-01

Responsibilities • Worked on a Solaris based in-house software suite, in a tier 3-support position. • Supported 1000’s of users in hundreds of worldwide locations, utilizing a myriad of sites across multiple platformed network system types. • Done testing on 2 GOTS applications. • Maintained data files, and control procedures for a complex system of networked computers, or for a single group of computers linked to a host workstation or mainframe. • Responsible for system security and data integrity. • Assigned a password setup, and monitory use of its resources. • Backed up files as assigned, and worked with management to define users request for information. • Provided on-site assistance to other intelligence agencies and field sites as required. • Worked with another projects personnel, and corrected a NIS+ problem. • While working on the server, and without any formal training, was able to troubleshoot that a hard drive had gone down, and was able to both bring up the downed system, and through server configuration, was able to reinitialize the vast array of feeds going through both the classified and unclassified servers. For this effort, received an award from both the Branch Chief and Deputy Branch Chief for, “… bringing up (named_server) and getting the server to work.” Carried a pager on (24 / 7), because of the mission critical work associated with that application. • Assisted with the installation of a KVM Switch. • Configured the right form to allow a new feed to go through on one of the servers. • Responsible for ensuring all Remedy tickets were resolved in a timely manner. • Configured an application on a standalone machine to be shown to new users and guests. • Configured a server application to be deployed to a key location. • Because of frequent and unpredictable system outages, had to do reverse engineering on both the hardware and software, which accompanied the program. Had to literally take apart the hardware to analyze it, and work with the Trusted Sun personnel to further analyze and resolve the problem.

Accomplishments While working on the server, and without any formal training, was able to troubleshoot that a hard drive had gone down, and was able to both bring up the downed system, and through server configuration, was able to reinitialize the vast array of feeds going through both the classified and unclassified servers. For this effort, received an award from both the Branch Chief and Deputy Branch Chief for, “… bringing up (named_server) and getting the server to work.” Carried a pager on (24 / 7), because of the mission critical work associated with that application.

SOLARIS SYSTEMS ENGINEER

Start Date: 2007-02-01End Date: 2008-11-01

Responsibilities • Ran error checks (/proc/mdstat) on several servers. • Loaded the Linux Hard Drive Firmware, and another Linux patch, on some of pressurewave systems. • Restarted the pressurewave html script. • Ran Linux commands on 2 Blade servers. • Added several users and their authorized keys to several of the servers. • Worked on using the Linux kickstart application, and configuring a server after doing a bare-metal load. • Made sure that all connections and right IP addresses were configured properly by checking the /etc/resolv.conf. • Made sure that the correct version(s) of the EITC IP webpage contained the right information. • Installed the updated bios patches on the project servers, and utilized integration of COTS and GOTS software. • Re-imaged the xkeyscore server. • Downloaded and configured the latest weblogic software. • Configured VNC (Virtual Network Computer) to gain access to a server. • Per request, ran the powerdown script, which power downed the server rack to be transferred. • Configured the metrotube servers for both the X5 and X7 systems. Ran the correct script, which power downed the entire power-tower, then brought the system back up, after a scheduled power outage.

UNIX SYSTEMS ADMINISTRATOR

Start Date: 2000-01-01End Date: 2000-04-01

Responsibilities • Performed Unix and NT Systems Administrator duties, by working on the Gartner Web page. • Worked with the Net Viz Architectural drawing application, which is used to configure the LAN’s. • Assisted with the setup and configuration of a Cisco router.

Target Analysis Reporter - United States Navy

Timestamp: 2015-05-21

• Current Top Secret/ SCI Clearance since 2009 • Current Counter Intelligence Scope Polygraph, completed 2010 • Signals Intelligence Analyst w/ 3 years experience • Provides Computer Network Operation expertise in support of Navy, National, and Joint requirements in the areas of Digital Network Intelligence and Computer Network Defense • Extensive use of the following tools (CPE, PINWALE, XKEYSCORE) • Team builder, inspires cooperation and progress and the best at accepting and offering team direction. Sought after by co-workers and leadership for technical knowledge

Information Systems Technician

Start Date: 2005-04-01End Date: 2009-04-01

and San Diego, CA

Operated and maintained the Navy's global satellite telecommunications systems, mainframe computers, local and wide area networks, and micro-computer systems used in the fleet. Administrative support was also provided with the operation of automated equipment that keeps records of personnel training, disbursement, health, assignments and promotions within the Navy. Ensured the all-important communications link between units at sea and stations ashore.

Was solely responsible for maintaining and inventory for over 342 government secret laptops and desktops and all peripherals. Dealing with basic updates and installation of software, troubleshooting all end user tickets, as well as all hardware issues and network connectivity issues.

Created over 400 user accounts in active directory and Microsoft exchange 2003. While creating these accounts I was responsible for giving users access to specific folders with read/write privileges for the proper departments ranging from classified information for the Commanding Officer to medical files for the medical department. The entire time I served as a system administrator we had no issues with any type of files being released to the wrong individual on the server.

Dealt with setting up communications and LAN Networks in the field for U.S. Military Special Operations Units

Digital Network Exploitation Analyst

Start Date: 2014-02-01

Responsibilities The Digital Network Exploitation (DNEA) Analyst will serve on a computer network operations (CNO) intelligence team, focused on the threat to networked weapons platforms and US and DoD information networks. The DNEA Analyst will collaborate with analytical counterparts across the U.S. Intelligence Community and apply knowledge of threat environment, open-source tools, and current implementation of threat technologies in order to devise all-source analytic/collection strategies to pursue access and exploitation of targets of interest.

➢ A highly organized professional with eight years of experience in the intelligence industry, all of which involved working for the National Security Agency and the United States Marine Corps. ➢ Demonstrated experience as a Spanish Linguist. Interprets and transcribes verbal and written communications. ➢ Diverse experience with local and national intelligence information databases to respond to/validate requests for intelligence information. Well-versed in collection, analysis and reporting. ➢ Performed a variety of administrative and staff support duties in support of the unit. ➢ Composed, edited, proofread correspondence, distributed inter-departmental memorandums (e-mail, documentary and voice) and ensured timely delivery and receipt of important information while maintaining confidentiality; directed and assisted visitors, and resolved administrative problems and inquiries. ➢ Possess strong organizational and communication skills.➢ Software: Proficient with MS Office applications (Access, Excel, Outlook, PowerPoint, Word) ➢ Extremely familiar with operating general office equipment ➢ Database Systems and Tools: Anchory/Maui, Intelink, Pinwale, SIGINT Navigator, XKeyScore. ➢ Working knowledge of DVTE Suite ➢ Working knowledge of Navy Standard Integrated Personnel System(NSIPS), Master Military Pay System(MMPA), and Defense Milpay Office(DMO)

Recruiting Assistant/Secretary

Start Date: 2014-12-01

Responsibilities  Answer telephones and give information to callers, take messages or transfer calls to appropriate individuals  Mange applications and applicants, making proper phone calls and taking proper avenues of approach to ensure minimum qualifications have been met for the application, scheduling and confirming for assessments and interviews  Greet employees, handle their inquiries and directed them to the appropriate persons for their needs  Greet applicants, assist them in completing the application and assessment  Operate office equipment such as fax machines, copiers, and phone systems, and use computers for spreadsheet, word processing, database management and other applications.  Manage multiple reports at the same time, ensuring data accuracy, timely and efficient reporting as needed  Set up and maintain paper and electronic filing systems for records, correspondence, and other material  Assist Human Resources department in taking employee documentation and write-ups, ensuring proper entry into corresponding spreadsheet as well as email the HR Generalist daily with excused absences provided with paperwork  Prepare and organize paperwork and other materials as needed for new hires, terminated employees and current employees  Handling confidential information in accordance with the company’s policies and guidelines

➢ Responsible for the management of 1,800 classified objects, including tracking while gear was signed out to deployed units over 4 continents. ➢ Provided pickup and delivery of SCI material through the Defense Courier Service for DIRINT personnel. ➢ Maintained SCI personnel security cognizance and was responsible for managing clearances and polygraphs for over 700 personnel. ➢ Obtained and maintained appropriate accreditation of SCI spaces. ➢ Managed and maintained accountability for the destruction of SCI material.

I am a military linguist and SIGINT analyst with over 12 years of real-world SIGINT experience. I work for the Utah Counter Drug Program on the RINGGOLD Task Force and for the office of International Crime and Narcotics. I have been with the Utah Counter Drug Program since 2004.QUALIFICATIONS SIGINT Experience 2011-Present Utah Counter Drug Program, Ogden, UT Operations Chief/Senior Reporter - Eastern Hemisphere Narcotics Oversee the operations, analysis, and product report release for 30 linguists and analysts working various high-level national security missions in the War on Drugs. Conduct report writing, report QC, report release, and SIGINT geospatial and metadata analysis on a daily basis. Serve as RINGGOLD Utah's representative on the International Crime and Narcotics Reporting Board, a position only offered to personnel with reporting expertise. […] Utah Counter Drug Program, Ogden, UT Reporter/Analyst - Western Hemisphere Narcotics Conducted SIGINT analysis and report writing on a daily basis on various Drug Trafficking Organizations within Central and South America. Served as the Portuguese Shop Team Chief during this time. […] Utah Counter Drug Program, Ogden, UT Voice and Language Analyst/QCer - Western Hemisphere Narcotics Served as a cryptologic linguist, producing translations, transcriptions, and intelligence to reports on Brazilian narcotics traffickers operating in Brazil, Suriname, and Guyana. Became the QCer for all traffic processed within eight months of starting. TOOLS Extremely proficient with tools and databases such as Grapevine, CPE, Sharkfinn, Cineplex, Goldminer, Anchory, SIGNAV, SEDB, Marina, XKS, Synapse, and many more. Proficient with GIS 9.3. Have completed multiple National Cryptologic Service (NCS) classes, to include but not limited to: EDUC2501 (adjunct instructor), RPTG2111, RPTG3222 (Product Report Writers Class - now known as RPTG3225), RPTG4398 (Product Report Releasers Course (adjunct instructor)), […] Geo Bootcamp (currently […] NETA2008, DNI OJT via Ft. Gordon Foundry Program, and various other NCS-related classes that have increased SIGINT knowledge and expertise. Team-taught GISA2011 and GISA2020 at FANX 2 in May of 2009. Served as the SIGINT SME for a JSOC exercise during FEB 2012, producing from scratch 40 SIGINT-related products in 24 hours. Attended an FTM course hosted by S2C @ Ft. Meade in May 2013. Proficiency w/ P300 GSM Network, DRT […] PRD-13, Trojan System, Prophet Systems, and other SIGINT platforms. Deployments to Theater of Combat Operations […] Operation Iraqi Freedom, Balad Air Base, Iraq (LSAA) Battle NCO Deployed in support of OIF as a 98G with Prophet III from C Co, 142nd MI BN (LING), attached to 1/34th BCT from MN. However, served as the Battle NCO (was an E5, served in an E7 slot) for the Day Shift of the Joint Intelligence Center (JIC) supervising a multiple-discipline intelligence shop of 12 soldiers; responsible for producing intelligence products to the Warfighter on a daily basis, to include, but not limited to: Battle Update Briefs, Senior Leader Update Briefs, Intelligence Summaries, Indirect Fire Attack Storyboards, Monthly Rollups, and other Intel products; responsible for ensuring intelligence operations (SIGINT, HAC, All-Source, IMINT, etc.) functioned and were cohesive for the Day Shift. Tracked all IDF attacks against LSAA for 16 months while in Iraq. Was the resident IDF expert @ LSAA, the largest base in Iraq; conducted predictive analysis for IDF attacks and enemy IDF teams, wrote IDF assessments for IDF Storyboards, and IDF assessments for JIC INTSUM. […] Operation Iraqi Freedom/Operation New Dawn, COS Sykes, Iraq SIGINT NCOIC Senior SIGINT analyst for a POC consisting of 11 soldiers. Coordinated operational SIGINT support and RFIs for local ODA team and battle-space owner, 3 Infantry Division, 6/8 CAV. Analyzed SIGINT traffic for valuable intelligence and assisted in the release of over 600 KLs and 300 RFIs during a 10-month period.

Intel Analyst

Timestamp: 2015-05-21

Seeking a SIGINT analytic position in the Intelligence Community that will utilize my previous experience as a MOS equivalent 1N2X1 in the U.S. Air Force with my research, analysis, and reporting skills while providing opportunities to employ my briefing, technical writing, and training management skills.

FORNSAT SIGNALS ANALYST

Start Date: 2009-09-01

Narrative of Qualification: I posses four years of experience as a signals intelligence analyst, including a 2-year overseas deployment supporting PACOM and AOR threats. In this capacity I researched, analyzed, and assessed SIGINT targets from multiple foreign military platforms, and reported and presented written reports and briefings to high-ranking military combatant commanders. Additionally I exploited and identified insurgent HF, FORNSAT and CYBER networks, helping exploit insurgent capabilities and communications. FORNSAT SIGNALS ANALYST Technical Exploitation Center (TEC) NSA SEP2009-Present

* Timely effective processing of high interest multiplexed FORNSAT signals that provided intelligence to national, theater, level officials and support to worldwide Signal Development Centers. * Handpicked by the TEC Director of Operations to be the only analyst to conduct FORNSAT survey & analysis on at our remote local site. * Exploited over 2000+ signals, enhancing mission awareness for multiple organizations at NSAHQ & worldwide. * Effectively learned the skills to perform analysis on different types of networks employing complex technologies. * Skillfully learned how to effectively exploit applications used on CYBER Networks expanding NSA knowledge and its overgrowing CYBER threat community.

(U//FOUO)

(U//FOUO)

* Trained 10+ senior individuals on Signals Analysis tools and software at various locations throughout NSA and the TEC branch. * Used as the primary means to conduct Spanish Language Analysis on multiple CYBER networks. * Proficiently learned to use over 15+ modem types and over 45+ software analytical tools. * Attended daily meetings, assessing what capabilities and new technologies extremist groups are using, creating a better targeting environment to exploit they're communications. * Researched and exploited numerous new CYBER technologies and reported numerous threats increasing Local/Regional stability. * Outstanding oral and written communications skills in Spanish and English, demonstrated with reports and briefings at tactical and strategic operational levels. * Can demodulate & decrypt HDR communications using standard demodulation types and methods like, QAM, PSK, ACM, CCM, TDMA, TDM, etc. * Worked on the construction of a 3 meter dish antenna and the install of its hardware components. * Understand the Microwave Frequency communications capabilities, especially in the Ku & C bands.

HF SIGNALS ANALYST / MISSION & TRAINING MANAGER

Start Date: 2007-09-01End Date: 2009-09-01

* Managed applicable mission operations and multi-million dollar forwarding and reporting systems. * Developed Job-Qualifications-Standards guide that was implemented throughout 4 shifts of 25+ personnel, creating a training success rate of 98%. * Handpicked by OPS Commander to fill Training/Mission Manager as an E-1; position held by senior Non-Commissioned Officers; elevated analyst and systems integration performance. * Analyzed and Reported 3700+ communications incoming from multiple foreign military platforms * Accurately Direction Fined and reported 1000+ real time targets on the Pacific theater. * Worked closely with worldwide Signal Development Centers analyzing various high priority targets. * Led analysis of OEF insurgent capabilities; built serialized threat warning report that reached the Presidents Daily Brief. * Led a group of SIGINT analyst on daily basis by strategically organizing and targeting networks of high probability and interest to national level customers.

Signals Intelligence Analyst

I have 1.5 years hands-on experience as and active duty service member serving at NSA-CSS GA. My job has multiple roles to include work in TDNA, SGA, training, and general intelligence analysis. I have experience in reporting, and have been in leadership roles in charge of supervising, and training new analysts to become diligent, Signals Intelligence Analysts. I have many certifications to include NETA, and NETO courses. I also have 2 years experience (to include 6 months of training) in databases, and tools such as the RT-RG suite, ARC-MAP, Association, Xkeyscore, Marina, SEDB, and many more.

Operations Center Controller - United States Air Force

Timestamp: 2015-12-26

Use my unique SIGINT and management experience to excel within a company. Highly motivated Intelligence Analyst with nine years work experience within the DoD/IC. Active TS/SCI clearance, Counter Intelligence (CI) polygraph, and language scores of 2+, 2+ in Korean. Fast learner with a broad range of skills in SIGINT collection along with multi-source (HUMINT, IMINT, SIGINT GEOINT, open source, etc.) analysis and reporting. Successfully managed collection, analysis, and reporting teams and developed multiple training guides and evaluations across various IC missions. Award winning Staff Sergeant in the U.S. Air Force.

Conventional Systems Supervisor

Start Date: 2009-09-01End Date: 2010-04-01

- Supervised Conventional Systems missions through tasking operators and by mitigating systems and personnel issues. - Fulfilled collection requirements mandated by the TOPI and provided threat warning support to United States and Allied aircrews operating within a high-threat environment.

IA/CND Analyst

Start Date: 2013-09-01End Date: 2013-10-01

Responsibilities • As an IA/CND Analyst I coordinated with NORAD and USNORTHCOM subordinate commands to assess asset compliance and reinforce NORAD and USNORTHCOM policies. Duties included communications with USCYBERCOMMAND; ensuring assets within the NORAD and USNORTHCOM area of operation (AOR) followed and applied network security guidelines, and report unusual network data in accordance with federal regulations. o Threat/Vulnerability Assessments, Risk Analysis and Malware Analysis. Working closing with National Security Agency, United States Computer Emergency Readiness Team and United States Cyber Command on current ongoing threats. o Created a common operating picture that ensures a comprehensive situational awareness of the entire network, providing visibility into the health, status, and activity on routers, switches and every device on the network. o Coordinate and performed enterprise monitoring, management, Information Assurance/Computer Network Defense, and coordinate technical support for Command and Control (C2) systems. o Performed continuous analysis, response, and reporting network attacks, security incidents, and vulnerability analysis and assistance on the enterprise networks or interconnected systems. o Identify coordination or documentation gaps in response to C2 reported events

Senior Information Security Analyst - SAIC

Timestamp: 2015-07-29

SPECIAL QUALIFICATIONS

20 Year Network and Intelligence Engineer, possesses dependable, leadership and managerial expertise in NOC, SOC, and MOC environments. Well diverse in both network and Sigint Intelligence analysis; able to use and implement the OSI model, vulnerability scanning, TCP/IP, ArcSight, Snort, Splunk, Sourcefire, OSSEC, and various other monitoring and trouble-shooting tools on a daily basis. Manage large and small teams while maintaining security of all Networks are never compromise.​ Coordinated with other IT staff to ensure effective operation of patch management, vulnerability management, and other System needs are met daily.​ Ability to analyze Signal Intelligence collection, dataflow, scripting, counter-terrorism, target analysis, Satellite communication, regional and site development, and cable installation. Implement Standard Operating Procedures for a variety of operating software tools, office equipment such as monitors, modems, and hard drives related to getting the mission done in a timely manner. Displays excellent communication, briefing and technical writing skills within the DOD environment.

Senior Network Engineer

Start Date: 2012-05-01End Date: 2013-09-01

Ability to quickly assess and trouble shoot System problem involving a wide variety of informational system data, work independently finding and detecting network issues such as attacks through analyzing and scanning the operating system(s), as well as thrive under pressure in fast-pace environment.. • Use various tools such as ArcSight, Sourcefire, Splunk, Snort, Wireshark to analyze important data coming from various locations around the world, helping make sure that our client data is never compromise through intrusions that had gotten pass our system firewalls. The knowledge and know how to alert all concern parties what thorough actions had taken place to get their system back up and running by giving them up to-date reporting through documentation. • Monitor and analyze the security of critical systems (e.g., e-mail servers, database servers, websites, etc.) and able to recommend system changes and procedures to appropriate system administrators and system engineers through investigative and noted documentation of system irregularities.

White House Escort, Washington D.C

Start Date: 2009-08-01

• Escorted authorized visitors and contractors on the job site. • Controlled access to restricted/classified information. • Exercise vigilance and safeguarding the security of the Executive Office Of The President.

Team Leader

Start Date: 2003-11-01End Date: 2004-11-01

in a collection and jamming platoon. o Provided combat intelligence support for the 2nd Infantry Division's Korean Peninsula Mission; Supervised the collection and electronic attack of enemy communications. o Maintained and was accountable for one AN/TLQ-17 (A) V3, two M1037s (vehicles), and associated equipment valued in excess of $750,000. Squad Leader/Team Leader for 6-8 US/ROK soldiers.